Author of the publication

Structural-based tunneling: preserving mutual anonymity for circular P2P networks.

, , , and . Int. J. Commun. Syst., 29 (3): 602-619 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

zk-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms., and . CoRR, (2024)Data User-Based Attribute Based Encryption., , , and . CISS, page 1-5. IEEE, (2020)Game-theory-based analysis on interactions among secondary and malicious users in coordinated jamming attack in cognitive radio systems., , and . CoRR, (2019)Game Theory-Based Analysis on Interactions Among Secondary and Malicious Users in Coordinated Jamming Attack in Cognitive Radio Systems., , and . J. Circuits Syst. Comput., 25 (8): 1650097:1-1650097:20 (2016)An Analysis on Interactions among Secondary User and Unknown Jammer in Cognitive Radio Systems by Fictitious Play., , and . CoRR, (2019)Multi-Authority Attribute-Based Access Control with Smart Contract., , and . ICBCT, page 6-11. ACM, (2019)Structural-based tunneling: preserving mutual anonymity for circular P2P networks., , , and . Int. J. Commun. Syst., 29 (3): 602-619 (2016)Defense against Lion Attack in Cognitive Radio Systems using the Markov Decision Process Approach., , and . CoRR, (2019)Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution., , , and . CoRR, (2020)C-trust: A trust management system to improve fairness on circular P2P networks., , , , and . Peer-to-Peer Netw. Appl., 9 (6): 1128-1144 (2016)